For engineers and security teams driving fast and secure software supply chains
☆86Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for blueprint-securesoftwarepipeline
Users that are interested in blueprint-securesoftwarepipeline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Oct 30, 2023Updated 2 years ago
- AWS Cloud Quest: Cloud Practitioner☆24Apr 8, 2022Updated 3 years ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Sep 15, 2021Updated 4 years ago
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆19Updated this week
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Dec 4, 2025Updated 3 months ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- Overview of philips-labs helm charts☆17Updated this week
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Updated this week
- ☆255Mar 16, 2026Updated last week
- Go implementation of witness☆46Mar 18, 2026Updated last week
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- An example repo demonstrating keyless signing with Github Actions☆11May 24, 2022Updated 3 years ago
- Witness Examples☆12Feb 27, 2024Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A CLI used to work with the Wolfi OSS project☆71Mar 17, 2026Updated last week
- Sharing software supply chain security open source projects☆53Dec 19, 2022Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Deploy certificates.☆15Aug 2, 2023Updated 2 years ago
- Open-source components of CyberArk Certificate Manager for Kubernetes Discovery.☆260Mar 10, 2026Updated 2 weeks ago
- GitHub actions and GitLab CI templates run various vulnerability scanners, upload the results into SecObserve and make the results of the…☆28Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆105Oct 13, 2025Updated 5 months ago
- ☆11Nov 26, 2024Updated last year
- Red Hat Advanced Cluster Management training and workshop exercises☆47Feb 10, 2025Updated last year
- ☆14May 9, 2025Updated 10 months ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- ☆76Dec 10, 2025Updated 3 months ago
- Demos and resources of the Istio + Gatekeeper talks at IstioCon 2022 and GitOpsCon 2022☆14Sep 4, 2023Updated 2 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- In this course navigates through the LLMOps pipeline, enabling you to preprocess training data for supervised fine-tuning and deploy cust…☆14Feb 13, 2024Updated 2 years ago
- To manage Docker Content Trust and Notary certificates☆13Mar 2, 2026Updated 3 weeks ago
- Comparison of Chainguard Images to others☆21Updated this week
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- ☆18Apr 29, 2024Updated last year
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆349Mar 14, 2026Updated last week
- TODO list - learning path☆10Apr 25, 2022Updated 3 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Given a buildinfo file from a Debian package, generate instructions for attempting to reproduce the binary packages built from the associ…☆17Sep 24, 2022Updated 3 years ago
- Various tools, images, etc. to support the Wolfi OSS project☆27Updated this week